Please use this identifier to cite or link to this item: http://repository.kln.ac.lk/handle/123456789/19445
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSandamali, N. P. A. A.
dc.contributor.authorWijesiri, G. S.
dc.date.accessioned2019-01-10T09:36:24Z
dc.date.available2019-01-10T09:36:24Z
dc.date.issued2018
dc.identifier.citationSandamali, N. P. A. A.,and Wijesiri, G. S. (2018). Scalar and multi-scalar multiplication in Elliptic Curve Cryptography using Fibonacci numbers. Research Symposium on Pure and Applied Sciences, 2018 Faculty of Science, University of Kelaniya, Sri Lanka. p100.en_US
dc.identifier.urihttp://repository.kln.ac.lk/handle/123456789/19445
dc.description.abstractCryptography is a science, which enables secure communications from various malicious adversaries using mathematical techniques. As a branch of cryptography, Neal Koblitz and Victor Miller introduced the Elliptic Curve Cryptography (ECC), in 1985. ECC provides us several advantages such as higher speed, efficient use of power and less storage. Security of ECC is based on the hardness of Elliptic Curve Discrete Logarithm Problem (ECDLP), which is defined as the problem of determining scalar d of the scalar multiplication Q = dP, when P and Q are given, where P and Q are two points on the elliptic curve. Lot of research are carried out to speed up and improve ECC implementations. Such researches mainly focus on the scalar multiplication, since it is the most important and time-consuming ECC operation. In this work we also focus on scalar as well as multi-scalar multiplication. Although Elliptic Curve Cryptosystems have enormous advantages, side channel attacks can break their common implementations. Finding methods against side channel attacks on elliptic curves is also a very active research. Simple Power Analysis (SPA) is a one type of side channel attack. In SPA, the attackers use the power consumption to monitor each operation and it helps attackers to retrieve secret scalar. Scalar multiplication is considered as a basic operation for elliptic curve cryptosystems. There are various methods to compute scalar multiplication in ECC. Generally, the most popular method is binary method. Unfortunately, although the binary method has excellent features, SPA attackers are able to fully reveal the secret scalar d, by observing the power trace of the binary method. One way to overcome this problem is finding a doubling free addition chain. Our main objective in this research is finding a doubling-free addition chain to compute scalar and multi-scalar multiples. As a solution for this problem, we proposed a new methodology to compute scalar and multi-scalar multiplication using Fibonacci numbers. We propose three algorithms. The first algorithm is for pre-computations in which we get a sequence of Fibonacci numbers to compute multiples. Using the resulting sequence, the second algorithm compute the relevant scalar multiplication. Using the same sequence, the third algorithm can compute the relevant multi-scalar multiplication. The proposed method shows higher performance when we compare new algorithms with traditional binary method.en_US
dc.language.isoenen_US
dc.publisherResearch Symposium on Pure and Applied Sciences, 2018 Faculty of Science, University of Kelaniya, Sri Lankaen_US
dc.subjectDoubling-free addition chainen_US
dc.subjectElliptic Curve Cryptographyen_US
dc.subjectmulti-scalar multiplicationen_US
dc.subjectscalar multiplicationen_US
dc.subjectsimple power analysisen_US
dc.titleScalar and multi-scalar multiplication in Elliptic Curve Cryptography using Fibonacci numbersen_US
dc.typeArticleen_US
Appears in Collections:IRSPAS 2018

Files in This Item:
File Description SizeFormat 
100.pdf566.66 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.